default search action
Alan T. Sherman
Person information
- affiliation: University of Maryland, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Selma Gomez Orr, Cyrus J. Bonyadi, Enis Golaszewski, Alan T. Sherman, Peter A. H. Peterson, Richard Forno, Sydney Johns, Jimmy Rodriguez:
Shadow IT in higher education: survey and case study for cybersecurity. Cryptologia 48(1): 26-90 (2024) - [j37]Farid Javani, Alan T. Sherman:
BVOT: self-tallying boardroom voting with oblivious transfer. Inf. Secur. J. A Glob. Perspect. 33(1): 42-53 (2024) - [c22]Shan Huang, Jiwoo Lee, Chenyan Zhao, Geoffrey L. Herman, Marc Olano, Linda Oliva, Alan T. Sherman:
A User Experience Study of MeetingMayhem: A Web-Based Game to Teach Adversarial Thinking. ITiCSE (1) 2024 - [i22]David Chaum, Richard Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagórski, Bingsheng Zhang, Zeyuan Yin:
Votexx: Extreme Coercion Resistance. IACR Cryptol. ePrint Arch. 2024: 1354 (2024) - 2023
- [c21]Geoffrey L. Herman, Shan Huang, Peter A. H. Peterson, Linda Oliva, Enis Golaszewski, Alan T. Sherman:
Psychometric Evaluation of the Cybersecurity Curriculum Assessment. SIGCSE (1) 2023: 228-234 - 2022
- [j36]Enka Blanchard, Ryan Robucci, Ted Selker, Alan T. Sherman:
Phrase-verified voting: Verifiable low-tech remote boardroom voting: How We Voted on Tenure & Promotion Cases during the Pandemic. Cryptologia 46(1): 67-101 (2022) - [j35]David Chaum, Mario Yaksetig, Alan T. Sherman, Joeri de Ruiter:
UDM: Private user discovery with minimal information disclosure. Cryptologia 46(4): 347-379 (2022) - [j34]Seth Poulsen, Geoffrey L. Herman, Peter A. H. Peterson, Enis Golaszewski, Akshita Gorti, Linda Oliva, Travis Scheponik, Alan T. Sherman:
Psychometric Evaluation of the Cybersecurity Concept Inventory. ACM Trans. Comput. Educ. 22(1): 6:1-6:18 (2022) - [i21]David Chaum, Richard Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang:
VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections. IACR Cryptol. ePrint Arch. 2022: 1212 (2022) - 2021
- [i20]Enka Blanchard, Ryan Robucci, Ted Selker, Alan T. Sherman:
Phrase-Verified Voting: Verifiable Low-Tech Remote Boardroom Voting. CoRR abs/2103.07180 (2021) - [i19]Farid Javani, Alan T. Sherman:
AOT: Anonymization by Oblivious Transfer. CoRR abs/2105.10794 (2021) - [i18]Farid Javani, Alan T. Sherman:
AOT: Anonymization by Oblivious Transfer. IACR Cryptol. ePrint Arch. 2021: 670 (2021) - 2020
- [j33]Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an academic community: A study of user susceptibility and behavior. Cryptologia 44(1): 53-67 (2020) - [j32]Enis Golaszewski, Alan T. Sherman, Linda Oliva, Peter A. H. Peterson, Michael R. Bailey, Scott Bohon, Cyrus J. Bonyadi, Casey Borror, Ryan Coleman, Johannah Flenner, Elias Enamorado, Maksim Ekin Eren, Mohammad Khan, Emmanuel Larbi, Kyle Marshall, William Morgan, Lauren Mundy, Gabriel Onana, Selma Gomez Orr, Lauren Parker, Caleb Pinkney, Mykah Rather, Jimmy Rodriguez, Bryan Solis, Wubnyonga Tete, Tsigereda B. Tsega, Edwin Valdez, Charles K. Varga, Brian Weber, Ryan Wnuk-Fink, Armand Yonkeu, Lindsay Zetlmeisl, Damian Doyle, Casey O'Brien, Joseph Roundy, Jack Suess:
Project-based learning continues to inspire cybersecurity students: the 2018-2019 SFS research studies at UMBC. Inroads 11(2): 46-54 (2020) - [c20]Alan T. Sherman, Erin Lanus, Moses Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus J. Bonyadi, Mario Yaksetig, Ian Blumenfeld:
Formal Methods Analysis of the Secure Remote Password Protocol. Logic, Language, and Security 2020: 103-126 - [c19]Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, Akshita Gorti:
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity. NCS 2020: 3-34 - [i17]Alan T. Sherman, Erin Lanus, Moses Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus J. Bonyadi, Mario Yaksetig, Ian Blumenfeld:
Formal Methods Analysis of the Secure Remote Password Protocol. CoRR abs/2003.07421 (2020) - [i16]Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, Akshita Gorti:
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity. CoRR abs/2004.05248 (2020) - [i15]Enka Blanchard, Ted Selker, Alan T. Sherman:
Boardroom Voting: Verifiable Voting with Ballot Privacy Using Low-Tech Cryptography in a Single Room. CoRR abs/2007.14916 (2020) - [i14]Farid Javani, Alan T. Sherman:
BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer. CoRR abs/2010.02421 (2020) - [i13]Farid Javani, Alan T. Sherman:
BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer. IACR Cryptol. ePrint Arch. 2020: 1233 (2020)
2010 – 2019
- 2019
- [j31]Alan T. Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
The SFS summer research study at UMBC: Project-based learning inspires cybersecurity students. Cryptologia 43(4): 293-312 (2019) - [j30]Alan T. Sherman, Farid Javani, Haibin Zhang, Enis Golaszewski:
On the Origins and Variations of Blockchain Technologies. IEEE Secur. Priv. 17(1): 72-77 (2019) - [j29]Alan T. Sherman, Peter A. H. Peterson, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
Project-Based Learning Inspires Cybersecurity Students: A Scholarship-for-Service Research Study. IEEE Secur. Priv. 17(3): 82-88 (2019) - [j28]Alan T. Sherman, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. IEEE Secur. Priv. 17(6): 77-83 (2019) - [c18]Spencer Offenberger, Geoffrey L. Herman, Peter Peterson, Alan T. Sherman, Enis Golaszewski, Travis Scheponik, Linda Oliva:
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review. FIE 2019: 1-9 - [c17]Travis Scheponik, Enis Golaszewski, Geoffrey L. Herman, Spencer Offenberger, Linda Oliva, Peter A. H. Peterson, Alan T. Sherman:
Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments. NCS 2019: 185-201 - [i12]Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. CoRR abs/1901.09286 (2019) - [i11]Dhananjay S. Phatak, Alan T. Sherman, Steven D. Houston, Andrew Henry:
PPT: New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues. A Set of Three Companion Manuscripts. CoRR abs/1908.06964 (2019) - [i10]Travis Scheponik, Enis Golaszewski, Geoffrey L. Herman, Spencer Offenberger, Linda Oliva, Peter A. H. Peterson, Alan T. Sherman:
Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments. CoRR abs/1909.04230 (2019) - 2018
- [j27]Alan T. Sherman, David DeLatte, Michael Neary, Linda Oliva, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Julia Thompson:
Cybersecurity: Exploring core concepts through six scenarios. Cryptologia 42(4): 337-377 (2018) - [j26]Geet Parekh, David DeLatte, Geoffrey L. Herman, Linda Oliva, Dhananjay S. Phatak, Travis Scheponik, Alan T. Sherman:
Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes. IEEE Trans. Educ. 61(1): 11-20 (2018) - [i9]Alan T. Sherman, Farid Javani, Haibin Zhang, Enis Golaszewski:
On the Origins and Variations of Blockchain Technologies. CoRR abs/1810.06130 (2018) - [i8]Alan T. Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students. CoRR abs/1811.04794 (2018) - [i7]Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an Academic Community: A Study of User Susceptibility and Behavior. CoRR abs/1811.06078 (2018) - 2017
- [j25]Alan T. Sherman, John Seymour, Akshayraj Kore, William Newton:
Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario. Cryptologia 41(1): 29-54 (2017) - [j24]Alan T. Sherman, Melissa Dark, Agnes H. Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel:
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research. IEEE Secur. Priv. 15(4): 72-78 (2017) - [j23]Jackson Schmandt, Alan T. Sherman, Nilanjan Banerjee:
Mini-MAC: Raising the bar for vehicular security with a lightweight message authentication protocol. Veh. Commun. 9: 188-196 (2017) - [c16]David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS 2017: 557-578 - [i6]Alan T. Sherman, Melissa Dark, Agnes H. Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel:
The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research. CoRR abs/1703.08859 (2017) - [i5]Alan T. Sherman, Linda Oliva, David DeLatte, Enis Golaszewski, Michael Neary, Konstantinos Patsourakos, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Julia Thompson:
Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project. CoRR abs/1706.05092 (2017) - 2016
- [c15]Travis Scheponik, Alan T. Sherman, David DeLatte, Dhananjay S. Phatak, Linda Oliva, Julia Thompson, Geoffrey L. Herman:
How students reason about Cybersecurity concepts. FIE 2016: 1-5 - [i4]David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Anonymization byHigh-Performance Scalable Mixing. IACR Cryptol. ePrint Arch. 2016: 8 (2016) - 2014
- [c14]Marc Olano, Alan T. Sherman, Linda Oliva, Ryan Cox, Deborah Firestone, Oliver Kubik, Milind Patil, John Seymour, Isaac S. Kohane, Donna Thomas:
SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education. 3GSE 2014 - [i3]Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Y. A. Ryan, Konstantinos Kalpakis:
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptol. ePrint Arch. 2014: 670 (2014) - [i2]Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman:
A Preliminary FPGA Implementation and Analysis of Phatak's Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System. IACR Cryptol. ePrint Arch. 2014: 1009 (2014) - [i1]Nathan E. Price, Alan T. Sherman:
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search. IACR Cryptol. ePrint Arch. 2014: 1023 (2014) - 2013
- [j22]Josiah Dykstra, Alan T. Sherman:
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Investig. 10(Supplement): S87-S95 (2013) - [j21]Dhananjay S. Phatak, Alan T. Sherman, Nikhil Joshi, Bhushan Sonawane, Vivek G. Relan, Amol Dawalbhakta:
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense. J. Comput. Secur. 21(2): 233-281 (2013) - 2012
- [j20]Alan T. Sherman, Dhananjay S. Phatak, Vivek G. Relan, Bhushan Sonawane:
Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies. Cryptologia 36(2): 129-148 (2012) - [j19]Josiah Dykstra, Alan T. Sherman:
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digit. Investig. 9(Supplement): S90-S98 (2012) - [c13]Timothy R. Leschke, Alan T. Sherman:
Change-Link: a digital forensic tool for visualizing changes to directory trees. VizSEC 2012: 48-55 - 2011
- [c12]Dhananjay S. Phatak, Alan T. Sherman, John Pinkston:
A New Paradigm to Approximate Oblivious Data Processing (ODP) for Data Confidentiality in Cloud Computing. SERVICES 2011: 391-398 - [c11]Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell, David C. Challener:
Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper). TRUST 2011: 294-301 - [c10]Alan T. Sherman, Russell A. Fink, Richard Carback, David Chaum:
Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability. EVT/WOTE 2011 - 2010
- [j18]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 5(1): 194 (2010) - [j17]Russell A. Fink, Alan T. Sherman, Richard Carback:
Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. IEEE Trans. Inf. Forensics Secur. 5(1): 194 (2010) - [c9]Alan T. Sherman, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Bimal Sinha, Poorvi L. Vora:
Scantegrity Mock Election at Takoma Park. Electronic Voting 2010: 45-61 - [c8]F. John Krautheim, Dhananjay S. Phatak, Alan T. Sherman:
Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. TRUST 2010: 211-227 - [c7]Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. USENIX Security Symposium 2010: 291-306
2000 – 2009
- 2009
- [j16]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 4(4): 611-627 (2009) - [j15]Russell A. Fink, Alan T. Sherman, Richard Carback:
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. IEEE Trans. Inf. Forensics Secur. 4(4): 628-637 (2009) - 2008
- [j14]David Chaum, Aleksander Essex, Richard Carback, Jeremy Clark, Stefan Popoveniuc, Alan T. Sherman, Poorvi L. Vora:
Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting. IEEE Secur. Priv. 6(3): 40-46 (2008) - [c6]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman:
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008 - 2006
- [c5]Alan T. Sherman, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, Akif Günes Koru, Chris M. Law, Donald F. Norris, John Pinkston, Andrew Sears, Dongsong Zhang:
An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study. EVT 2006 - 2003
- [j13]Alan T. Sherman, David A. McGrew:
Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Trans. Software Eng. 29(5): 444-458 (2003)
1990 – 1999
- 1997
- [j12]Thomas R. Cain, Alan T. Sherman:
How to Break Gifford's Cipher. Cryptologia 21(3): 237-286 (1997) - [j11]Muhammad Rabi, Alan T. Sherman:
An Observation on Associative One-Way Functions in Complexity Theory. Inf. Process. Lett. 64(5): 239-244 (1997) - 1995
- [j10]Bradley C. Kuszmaul, Alan T. Sherman:
*Socrates 2.0 Beats Grandmaster Sagalchik. J. Int. Comput. Games Assoc. 18(2): 124 (1995) - [j9]David M. Lazoff, Alan T. Sherman:
Expected Wire Length between Two Randomly Chosen Terminals. SIAM Rev. 37(2): 235 (1995) - 1994
- [j8]Ravi Ganesan, Alan T. Sherman:
Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English. Cryptologia 18(4): 289-331 (1994) - [j7]Konstantinos Kalpakis, Alan T. Sherman:
Probabilistic analysis of an enhanced partitioning algorithm for the steiner tree problem in Rd. Networks 24(3): 147-159 (1994) - [j6]Sivakumar Ravada, Alan T. Sherman:
Experimental evaluation of a partitioning algorithm for the steiner tree problem in R2 and R3. Networks 24(8): 409-415 (1994) - [c4]Thomas R. Cain, Alan T. Sherman:
How to Break Gifford's Cipher (extended abstract). CCS 1994: 198-209 - 1993
- [j5]Ravi Ganesan, Alan T. Sherman:
Statistical Techniques for Language Recognition: an Introduction and Guide for Cryptanalysts. Cryptologia 17(4): 321-366 (1993) - 1991
- [j4]Alan T. Sherman:
On Superpolylogarithlnic Subexponential Functions (Part I). SIGACT News 22(1): 65 (1991) - 1990
- [j3]Robert W. Baldwin, Alan T. Sherman:
How we Solved the $100, 000 Decipher Puzzle (16 Hours too late). Cryptologia 14(3): 258-284 (1990) - [j2]Robert Y. Levin, Alan T. Sherman:
A Note on Bennett's Time-Space Tradeoff for Reversible Computation. SIAM J. Comput. 19(4): 673-677 (1990)
1980 – 1989
- 1989
- [b1]Alan T. Sherman:
VLSI Placement and Routing - The PI Project. Texts and Monographs in Computer Science, Springer 1989, ISBN 978-3-540-97077-4, pp. I-XII, 1-189 - 1988
- [j1]Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). J. Cryptol. 1(1): 3-36 (1988) - 1985
- [c3]Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). CRYPTO 1985: 212-226 - [c2]Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is the Data Encryption Standard a Group? (Preliminary Abstract). EUROCRYPT 1985: 81-95 - 1983
- [e1]David Chaum, Ronald L. Rivest, Alan T. Sherman:
Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982. Plenum Press, New York 1983 [contents] - 1982
- [c1]Ronald L. Rivest, Alan T. Sherman:
Randomized Encryption Techniques. CRYPTO 1982: 145-163
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint